Security October 11, 2017 Phishing Demonstration Setup with Kali The post contains a crude example on how to easily clone an existing site for use in a phishing campaign. It is based on rudimentary techniques as it is only meant as a proof-of-concept demonstration…